If a suitable executable file is found, the virus will infect it by injecting its code into the executable and modifying the entry point of the file. The viral code may be placed anywhere within the file, but is executed after the host executable code is finished running.

This virus is regarded as a low threat that is easy to contain and remove. Technical details can be found on Symantec page.